Security Management


Complex Attacks Bypassing Enterprise Safeguards

Enterprises are increasingly being targeted by complex attacks designed to bypass existing safeguards.

Debunking 6 Myths about SSL VPN Security

Think VPN makes for secure data access and transfer? Think again.

Social Media: A Hacker's Secret Weapon for Accessing Your Network

Deep content inspection-based security solutions let your organization take advantage of social media's benefits as it safeguards policies and compliance.

Microsoft Report Dishes on Malware Prophylaxis, Zero Day Hysteria

Why do zero-day attacks -- which account for a vanishingly small percentage of all exploit activity -- generate a disproportionate percentage of security headlines.

Security: IT Shops Unprepared to Police Social Media in the Enterprise

Few IT organizations are prepared to manage the use of social media in the enterprise. This is particularly true from a security perspective.

How to Evaluate a Cloud Provider’s Security Features

An introduction to the security requirements you should expect from a cloud service provider.

New Windows Worm Exploits IT Sloppiness

Silly or not, the Morto worm has caused a good bit of mischief.

5 Reasons to Replace Your Traditional One-Time Passwords

Millions rely on traditional one-time password tokens. Here’s why your organization may want to replace or augment this approach for perimeter security.

Spearphishing on the Rise

Attackers are reducing traditional mass-spam phishing campaigns in favor of targeted or spearphishing attacks.

New Malware Attacks Both PCs and Macs

Malware-makers have a powerful new tool: a spam bot that infects both PC and Mac platforms -- with support for Linux and iPad operating systems in the works.

Best Practices for Securing Private Keys and Code-Signing Certificates

Stuxnet, a high-profile cyberattack, used malware signed with legitimate code-signing certificates. What went wrong and how can you protect your own assets?

Analysis: RSA SecurID Token Vulnerabilities Back in the Spotlight

The other shoe finally dropped in the case of the SecurID data breach at RSA. Could the fallout have been avoided?

Q&A: Wi-Fi Drives VPN Adoption at Swiss Insurer

Getting and staying connected was key to this Swiss insurance company, but Wi-Fi access meant it had to find a VPN solution.

Security Vulnerabilities Down but Still Strong

Although the frequency of security vulnerabilities continues to decline, vendors were still preoccupied with patching last year.

Q&A: Best Practices for Enterprise-Scale Identity and Access Management Systems

What is IAM and how can you make an IAM project a success?

Overcoming Security Pains in UNIX Environments

Getting a handle on UNIX vulnerabilities is no easy task.

Firewalls Get Failing Marks; Enterprise Security Flunking, Too

Why does IT pass the buck to other internal groups when it comes to safeguarding enterprise security?

How to Mitigate Smartphone Threats to Your Corporate Network

These tips can help you minimize mobile threats.

CA Courts SecurID Customers

Who said hardware authentication tokens are infallible? CA's new program contrasts the advantages of its software-based approach with RSA Security's hardware-based SecurID model.

Auditors, Employers at Odds Over Security

A new survey shows a disconnect between the security-first mentalities of auditors and the compliance-driven concerns of their employers.